Persistent Misuse. A statement of Ofcom s general policy on the exercise of its enforcement powers

Size: px
Start display at page:

Download "Persistent Misuse. A statement of Ofcom s general policy on the exercise of its enforcement powers"

Transcription

1 A statement of Ofcom s general policy on the exercise of its enforcement powers Statement Publication date: 20 December 2016

2 About this document Ofcom has powers to take action if a person persistently misuses an electronic communications network or service. We are required to set out a general policy on how we are likely to use these powers and to have regard to that policy when exercising them. This is a statement of our general policy. It applies from 1 March 2017.

3 Contents Section Page 1 Ofcom s statement of policy on its persistent misuse powers 1 Annex Page 1 Forms of misuse 4 2 Prioritisation 11 3 Calculating the Abandoned Call Rate 15

4 Section 1 1 Ofcom s statement of policy on its persistent misuse powers Overview 1.1 Ofcom has powers 1 to take enforcement action against those who persistently misuse electronic communications networks 2 and services. 3 Persistent misuse involves using a network or service in ways which cause or are likely to cause someone else, especially consumers, to suffer harm. Ofcom can take action to stop it and to remedy its consequences and can impose penalties of up to 2 million. 1.2 Ofcom is required to publish a statement of our general policy on the exercise of our enforcement powers against persistent misuse. We have a duty to have regard to that statement when we exercise those powers. 4 This is our statement, including the annexes, which will apply from 1 March A person 5 may misuse a relevant network or service in two possible ways: One is where the particular way the person uses the network or service itself causes or is likely to cause unnecessary annoyance, inconvenience or anxiety to someone else. An example, described more fully in Annex 1, is where a person makes silent or abandoned phone calls. The other is where the person uses the network or service to do something else which causes someone unnecessary annoyance, inconvenience or anxiety. Some examples are described more fully in Annex 1, but one is where a person uses the phone in a way that misleads others into calling premium rate service numbers. 1.4 Misuse is persistent where it is repeated enough for it to be clear that it represents a pattern of behaviour or practice, or recklessness about whether others suffer the relevant kinds of harm. 1.5 Ofcom may take enforcement action against any persistent misuse falling within these parameters. 1.6 We set out in Annex 1 to this document examples of various forms of misuse. These are based on forms of misuse that Ofcom is currently aware of, for example, as a result of complaints that have been made to us. All of these forms of misuse may cause harm to consumers and Ofcom will take enforcement action in relation to them as appropriate. 1 Under sections of the Communications Act 2003 (the Act). 2 As defined in section 32(1) of the Act, as, a transmission system for the conveyance, by the use of electrical, magnetic or electro-magnetic energy, of signals of any description; and [ancillary apparatus and other resources]. 3 As defined in section 32(2) of the Act, as a service consisting in, or having as its principal feature, the conveyance by means of an Electronic Communications Network of signals, except in so far as it is a content service. 4 Although it does not bind us in exercising our discretion in connection with them. 5 Who may be an individual or an organisation like a company. 1

5 Prioritising 1.7 Ofcom has to prioritise its enforcement activities and will do so by reference to those cases liable to cause the greatest consumer harm. Annex 2 to this document sets out Ofcom s prioritisation approach in more detail. 1.8 We monitor the numbers of unwanted phone calls consumers receive, and the numbers of complaints Ofcom receives from various sources, including consumers and communications providers, about different forms of misuse. We also gather evidence from consumers about the harm they suffer. 1.9 The evidence shows consumers receive very high numbers of silent calls. Ofcom receives more complaints about silent calls than other forms of misuse, and our research shows consumers find a higher proportion of them annoying than other types of call. They are also liable to have more serious harmful effects, such as causing anxiety. Ofcom s current top priority is to tackle silent calls The evidence also shows that consumers continue to receive large numbers of abandoned calls and they make significant numbers of complaints about them to Ofcom. Our research has also consistently shown that these sorts of calls annoy consumers. Ofcom is also concerned to tackle abandoned calls Ofcom may take action in relation to other forms of persistent misuse where there is significant harm. We are more likely to act, for example, the greater the extent of the misuse a person commits and the more complaints we receive about it, or if there are other circumstances or factors liable to exacerbate the harm involved. The way we investigate 1.12 The processes Ofcom will generally follow in conducting investigations and enforcement actions are set out in our Enforcement Guidelines In relation to persistent misuse specifically, Ofcom may open investigations on its own initiative or on the basis of information it receives, such as complaints to our Consumer Contact Team, industry data and information from other enforcement agencies Our usual approach is to seek to establish the identity of the person responsible for the potential misuse, including where necessary through call tracing. We will then gather further evidence, which may include issuing formal information requests to the person or persons under investigation, and/or to third parties with relevant information, using our powers under section 135 of the Act In assessing the persistence of a person s misuse, we are likely to investigate cases by looking at their use of networks or services over a six to 12-week period. 7 We are more likely to regard misuse as persistent where there is evidence it occurred: either throughout or at different points during the period investigated; and at levels greater than could reasonably be attributed to factors such as accidental human error, isolated agent misbehaviour or one-off technical errors; or 6 data/assets/pdf_file/0034/79846/enforcement_guidelines.pdf 7 Although we may look at different periods where appropriate. 2

6 where there is evidence the misuse was repeated in a way that shows disregard for the risk of harm to consumers On the basis of the information gathered, we will decide, on a case-by-case basis, whether to take action. We may decide either to: take no further action, on the basis that we do not have reasonable grounds for believing that a person has persistently misused a network or service, or on administrative priority grounds; take enforcement action and issue a formal notification under section 128 of the Act (and in appropriate cases, notice of a penalty we are minded to impose under section 130) where we have reasonable grounds for believing that a person has persistently misused a network or service; or take action to obtain assurances from the person that they will change their behaviour Where we issue a notification to any person under section 128, that person will have a chance to make representations. Subject to those representations, we may serve enforcement notifications requiring any person to stop and remedy any persistent misuse, and to pay a financial penalty Where we seek or obtain assurances from a person, it may also be appropriate to take formal enforcement action later on. For example, if engagement on this basis does not produce the desired outcomes or any assurances given are later breached. Persons against whom we will enforce 1.19 A person or organisation may be liable for persistent misuse where they are misusing networks or services themselves, or where they have engaged another person or organisation to use the network or service on their behalf. The latter may arise where an organisation engages representatives, such as third party call centres, to contact UK consumers on its behalf. The organisation engaging the third party to make the calls may be the subject of an investigation and action under the Act for persistent misuse by its representatives It will not usually be our intention to take action against a communications provider over whose network or service the persistent misuse takes place. In some cases, however, it may be appropriate to do so. For example, it may be appropriate to take action where the provider itself is responsible for, or involved in, perpetrating the misuse. This could occur where, for instance: the principal party the person making the calls has spoofed their CLI number and the communications provider was complicit in the spoofing; or the provider participates in an arrangement it knows involves the artificial inflation of call traffic in order to cause consumers to incur inappropriate call charges by making calls to revenue-sharing numbers. 3

7 Annex 1 1 Forms of misuse Introduction A1.1 Examples of the kinds of behaviour which Ofcom is likely to regard as misuse are set out below. A1.2 These forms of misuse are commonly, but not necessarily, caused where organisations using call centres make outbound calls to consumers, often using dialling technology. They call, or attempt to call, consumers for various reasons, such as telemarketing, debt collection, charity fundraising and market research. However, as a result, some consumers receive calls which can cause unnecessary annoyance, inconvenience or anxiety. Silent calls A1.3 Silent calls are a prime example of misuse. When a call recipient experiences one of the following, we consider that they have received a silent call : 8 they hear nothing on answering the phone; 9 they are disconnected by the calling party as soon as or shortly after they pick up the phone; they hear background or distant noise, whether spoken or otherwise, such as chatter (but the conversation is not directed at the call recipient), breathing or electronic beeps; they hear something else which falls short of a message (whether spoken or otherwise) directed at the call recipient; or they experience a combination of the above, such as a short period of silence followed by disconnection by the calling party (known as a short duration call ). A1.4 In a silent call the caller does not play any sort of information message informing the recipient about the attempted call (or any other sort of communication directed at that person). It is distinct from an abandoned call, which is described below. A1.5 Ofcom understands that silent calls are usually a result of organisations, or call centres calling on their behalf, using Automated Calling Systems (ACS). 10 Silent calls may occur when the ACS has over-dialled, so that all the call centre agents are busy when the call recipient answers the phone and/or the ACS disconnects the call. 8 Or a call equivalent to a silent call and which we are likely to treat as such. 9 Except for calls as described in paragraph A1.10 where the caller would have played an automated message but the recipient hangs up before the message plays. We treat these as abandoned calls. 10 ACS is technology which can automatically dial and connect calls. Outbound automated calling systems work by accepting a bulk input of telephone numbers, usually from a computer drive or database, and then making calls and trying to connect the called party to a live agent or playing a pre-recorded message. 4

8 A1.6 Some organisations also use technology in conjunction with ACS to detect answer machines and disconnect calls picked up by them. However, this technology, referred to as Answer Machine Detection (AMD), may generate silent calls by mistaking a call recipient for an answer machine and disconnecting the call. A1.7 Silent calls can also be caused where no technologies are used at all. For example, where the agent making the call hangs up when the call recipient answers the phone. A1.8 Ofcom considers silent calls to be misuse wherever they are caused by something within the calling party s responsibility or control. 11 The numbers of consumer complaints to Ofcom and consumer research Ofcom has carried out consistently demonstrate that silent calls are liable to cause some recipients annoyance, inconvenience or anxiety. Abandoned calls A1.9 Abandoned calls, commonly referred to in the call centre industry as dropped calls, are another example of misuse. They occur when a party makes a call with a view to the recipient speaking to a live agent but, instead of being connected to an agent or experiencing a silent call, the caller plays the recipient a message (usually an information message), 12 or would do but for the call recipient disconnecting the call themselves. 13 A1.10 Abandoned calls can occur, for example: In relation to live calls where the calling party makes calls 14 with a view to live agents speaking directly to call recipients. The call may be abandoned because an insufficient number of agents are available to take the call and a recorded message is played instead. In relation to automated calls involving interaction from the call recipient where Interactive Voice Messaging (IVM) 15 is used and the call recipient answers the phone and hears an automated message which asks them to press a button to speak to an agent or to answer a series of automated questions before being connected to an agent. Where the call recipient has indicated a preference to be put through to an agent, they may experience an abandoned call and instead hear an information message. In relation to calls which would otherwise have been abandoned where the call recipient answers and would have heard an information message instead of being connected to a live agent. However, the call recipient disconnects the call themselves before the message is played. 11 Including but not necessarily by any calling technology it uses. 12 In Annex 2 below, we set out our policy position on information messages and how we are likely to take the contents of those messages into account in deciding what action we may take. 13 Abandoned calls only include those picked up by live individual recipients, and not calls picked up by answer machines. 14 Whether using ACS or not. 15 Sometimes also referred to as Interactive Voice Recognition (IVR). IVM is technology that automates telephone contact between humans and machines. It is typically operated by computers and includes prompts for the call recipient to either press a button or speak a response. Depending on the recipient s input, the automated system may play some information, route the recipient to another prompt or connect them with a human operator. 5

9 A1.11 As with silent calls, abandoned calls will be a misuse where they are caused by anything within the calling party s responsibility or control. As with those calls, complaints to Ofcom and our consumer research consistently demonstrate that abandoned calls are liable to cause some recipients annoyance, inconvenience or anxiety. Distinctions between silent and abandoned calls A1.12 Calls may either be silent or abandoned, but not both. We treat them as mutually exclusive categories, distinguished by the lack of communications or messages directed to the recipient in the case of silent calls and the information message that is, or would be, played in an abandoned call. A1.13 Calling parties should not make silent or abandoned calls. Ofcom considers both to be misuse, but that silent calls are likely to be an even more harmful type because less information about the call (such as the caller s identity) is provided to the recipient and because the nature of the call may mean the recipient considers it to be threatening or malicious. A1.14 Ofcom therefore expects that, where parties make calls but there are insufficient live agents to handle them when answered by recipients, those parties should play an appropriate information message (see Annex 2 below). The call would still be an abandoned call and the making of such calls may amount to persistent misuse, but the message would prevent the additional harm associated with a silent call. Misuse for dishonest gain scams A1.15 Some activities associated with the use of electronic communications networks or services are motivated by a desire for unscrupulous or dishonest gain (scams). 16 This Annex does not describe them fully, so as not to encourage them. However, Ofcom is likely to regard conduct which shares common characteristics, like those set out below as examples of misuse. A1.16 Characteristics common to scam calls may include: they are primarily aimed at defrauding the end consumer; and they exploit the use of premium rate or other revenue sharing services, or in some cases non-revenue sharing services, to generate calls where consumers are misled 17 about the service offered and/or the costs involved. A1.17 Ofcom will regard the practice of misleading call recipients 18 into phoning a premium rate or revenue sharing number, including numbers in the 08xx range, or a non-revenue sharing service that leads to the presentation of a fraudulent or unexpectedly high bill, as misuse. We are also likely to regard as misuse cases where the principal purpose or effect of the caller s outbound calls is or was to generate return calls by consumers using revenue sharing numbers. 16 Although dishonesty is not an element of persistent misuse and taking action in respect of any such misuse does not require Ofcom to prove dishonesty or deception. 17 Including by omission of material information. 18 Including by omission. 6

10 Misuse of a CLI facility A1.18 CLI is a facility by which the telephone number of a calling party is presented to the call recipient. 19 In some cases, the caller may legitimately alter the CLI number that is seen by the person receiving the call. For example, so that the number displayed 20 is the number for the relevant department in the calling organisation and to which the caller wishes to direct any return calls. A1.19 CLI numbers serve useful purposes as far as call recipients are concerned. They help them to identify callers and to decide whether to answer. 21 They also enable recipients to call the number back later, for reasons that may include finding out who made the call, expressing interest in services or to request that no further calls are made. CLI numbers also enable recipients to report calls to Ofcom and other regulators. A1.20 Misuses of a CLI facility include: the withholding of CLIs by those making marketing calls, in breach of the Privacy and Electronic Communications (EC Directive) Regulations 2003 (PECRs, see further below); displaying a CLI which is not authentic or valid; 22 displaying a CLI which is unreturnable such that, when called, 23 the number does not connect to an agent or an automated message; or displaying a CLI which is a controlled premium rate service number. 24 A1.21 Misuse may also arise where calling parties use a number of different CLIs. Those making calls for business or marketing purposes may use several, presenting different ones to recipients of different calls. There may be good reasons for this, like using different numbers for different customer groups 25 or so that any subsequent calls can be returned to the correct location. A1.22 The reasons for doing so may also, however, be illegitimate. For example, using large numbers of different CLIs so as to mislead recipients about the caller s identity or whereabouts and to answer or return a call when they otherwise would not, or to avoid detection and complaints to Ofcom or other regulators. A1.23 The use of a number of different CLIs therefore has the potential to involve misuse. Where there is evidence, such as complaints, that call recipients are being misled by the use of different CLIs and this is causing them unnecessary annoyance or other effects falling within section 128 of the Act, we may regard it as misuse. 19 For example, on a handset display screen prior to a call being established or where the recipient dials 1471 after receiving a call. 20 Known as a Presentation Number. 21 Some handsets and services may rely on CLI information in order to block and filter calls. 22 For example, it is a false, spoofed, or random number which does not dial or where a connection cannot be established or it does not connect to the person or organisation calling. 23 And although there may be a dialling tone. 24 As defined in the condition regulating premium rate services under section 120 of the Act. 25 For example, by location or type of service. 7

11 A1.24 Where a person calls the CLI provided and is connected to an agent or an automated message, we may also regard it as misuse if: no information is provided about the organisation which called, or the organisation on whose behalf the call was made; an opportunity is not provided for the person called to opt out of future unsolicited marketing calls or messages; or the call is used as an opportunity to market to that person, without their consent. Misuse of a network or service which is also a breach of the PECRs A1.25 There are some circumstances in which an activity or conduct involving the use of a network or service may amount to misuse under section 128 of the Act and may breach the PECRs. For example, parties making unsolicited marketing communications: failing to identify themselves on calls; withholding their CLIs; making calls to people on the Telephone Preference Service s do not call register and/or those who have asked to be placed on the caller s own in-house do not call list; and/or using ACS in ways that breach the PECRs, such as making recorded direct marketing calls without the recipients consent. A1.26 When considering cases like these, Ofcom will usually consult with the Information Commissioner s Office, 26 to determine who is best placed to take the most appropriate course of action. We may take action on the basis the conduct amounts to persistent misuse. Misuse resulting from use of technology A1.27 As well as silent and abandoned calls, use of dialling technologies, like ACS, and other technology such as automated messages, 27 IVM and AMD, can cause other forms of misuse. A1.28 For example, Ofcom is likely to regard it as misuse if a caller uses IVM and the call recipient elects to speak to an agent but experiences an unfairly long wait-time to do so. We would asses this on a case-by-case basis. A1.29 Our concern would be that the calling party is unjustifiably wasting the recipient s time. We are therefore more likely to regard a call waiting time as unfairly long where, for example, the caller: 26 The Information Commissioner s Office is the UK s independent authority set up to uphold information rights in the public interest, promoting openness by public bodies and data privacy for individuals. It has primary responsibility for enforcing the PECRs. 27 Including broadcast messages or robo-calls, where the sole purpose is to make a recorded announcement, rather than to connect a consumer to a live agent. 8

12 makes far more calls than they have live agents to handle; and keeps recipients holding on the line for unreasonable times without providing recipients with clear and accurate information, such as the caller s identity and the purpose of the call, the recipient s position in any call waiting queue and the likely waiting time. A1.30 In those circumstances, call recipients time is being taken from them without them being given a fair and informed choice to use that time waiting on hold. A1.31 Misuse may also arise in other circumstances involving IVM. An unreasonably long holding time might, to take one example, involve misuse, even where call recipients are given the kind of information described in the previous paragraph. There is the potential for such misuse where calling organisations make essential calls to recipients using IVM 28 but, when those recipients elect to speak to an agent, they are kept on hold for a manifestly excessive time. A1.32 Another example of possible misuse involving IVM is where, during the time the call recipient waits to be connected to an agent, marketing content is included in any information provided but the relevant requirements for doing so 29 have not been met. Misuse of allocated telephone numbers A1.33 Where telephone numbers have been allocated, Ofcom will regard their use 30 in a way that is inconsistent with designations and/or restrictions in the National Telephone Numbering Plan (the Plan) 31 as a form of misuse. An example would be where Personal Numbers (070) are used for anything other than providing a Personal Numbering Service 32 or Mobile Numbers 33 are used for services other than those which fall within the definition of Mobile Service. 34 A1.34 In these cases, any action would usually be taken against the person or organisation making the relevant calls. However, condition 17 of the General Condition of Entitlement imposes obligations on communications providers in relation to the use of telephone numbers. Such a party could also be liable for persistent misuse where, for example, they are involved in the misuse of the network or service (see Section 1 above). Number-scanning and fax-scanning A1.35 Number-scanning (also known as pinging ) is another example of misuse. It involves making calls to find out which telephone or fax numbers, out of a range, are in service. As soon as a tone is received which establishes the status of a particular number, the call is terminated. This is usually done by the caller in order to develop lists of active telephone numbers. 28 For example, about fraud, debt-recovery or essential utilities. 29 Such as obtaining consent under the PECRs. 30 Whether by the end-user, relevant communications provider, intermediary or other party. 31 Ofcom, The National Telephone Numbering Plan, 32 As defined in the Plan , 077, 078 and As defined in the Plan. 9

13 A1.36 As well as the inconvenience that may be caused to the recipient of an abruptly terminated call, such behaviour is detrimental to consumers in general by adding to network congestion without generating any revenue for communications providers. In a worst case scenario, high-volume number-scanning could overload either the originating or terminating local exchange, depriving users connected to that exchange of the ability to make or receive calls. Other forms of misuse A1.37 Ofcom may also regard other forms of behaviour as misuse. An example is where call centre agents making outbound calls behave improperly towards call recipients, such as using rude or intimidating behaviour. Where such behaviour is repeated, this may amount to persistent misuse. 10

14 Annex 2 2 Prioritisation A2.1 This Annex sets out how Ofcom is currently likely to prioritise cases for action based on the likely consumer harm involved. A2.2 Our assessment of harm will usually take account of: the type of misuse involved; and the level of likely consumer harm. A2.3 Action against those making silent calls is likely to be our highest priority. Of the types of unwanted phone calls that fall within Ofcom s exclusive jurisdiction, silent calls are the most common. UK consumers receive very high numbers of them, complain to Ofcom more about them than other unwanted phone calls and find more of them annoying. A2.4 Action against persistent abandoned calls is also likely generally to be a priority. The evidence also shows that consumers continue to receive large numbers of abandoned calls and they make significant numbers of complaints about them to Ofcom. Our research has also consistently shown that these sorts of calls annoy consumers. A2.5 We may also make a priority of any case whatever the form of misuse involved where there is significant harm. A2.6 We are more likely to act in any individual case: the more silent, abandoned or other calls or misuses a party makes, or the higher the rate at which it makes those calls; 35 the greater the number of consumer complaints the misuse attracts; the more serious harm the form of misuse is liable to cause; where there is any evidence of flagrant or deliberate non-compliance with the law and/or disregard of this policy; and/or the greater the need we assess for deterrent action. A2.7 There are also particular factors, described below, which we are likely to take into account in assessing some cases. They may mitigate or aggravate the harm caused by the misuse and increase the priority we attach to the case. 36 We will not consider these factors in a mechanistic way. It may not be appropriate or necessary to consider some or all of them in any particular case. They are not all relevant to 35 In prioritising cases, one factor we may take into account is the abandoned call rate (or ACR). See Annex 3 for the way in which we are likely to calculate the rate at which abandoned calls in particular are made. 36 As well as increasing the seriousness with which we would regard the matter when assessing a person s liability for persistent misuse. 11

15 every form of misuse. In other cases, it may be appropriate to consider other factors not set out here. Misuse repeated in respect of the same number or recipient A2.8 In appropriate cases, Ofcom will take account of the extent to which any misuse is repeated. Generally, we are likely to regard repeated misuse in respect of the same number, or recipient, as an aggravating factor indicating a higher degree of harm. A2.9 One of the ways we may assess this is whether any calls constituting misuse 37 are made within the 72 hours following the first instance of misuse. If they are, we would consider the circumstances in which the repeat calls were made 38 and whether the calling party guaranteed the availability of a live agent for the repeat call. If not, Ofcom is likely to regard the repeated call(s) as an aggravating factor. A2.10 In some cases, it may be appropriate to take account of misuse repeated in respect of the same recipient, rather than the same number. An example may be where the misuse consists of deception for dishonest gain. Time(s) of day misuse occurs A2.11 Ofcom may also take into account the time(s) of day at which misuse occurs. We are likely to regard misuse at unsociable hours as more harmful and liable to action. We do not prescribe those hours and will consider matters on a case-by-case basis. Nevertheless, we think there are some obvious examples, such as ringing someone repeatedly, or for marketing purposes, in the middle of the night. CLI A2.12 As described in Annex 1, the proper provision by calling parties of CLI numbers serves a number of useful purposes for recipients, some relating to the protection of privacy. Accordingly, we are likely to regard cases in which a calling party misuses CLI facilities as serious and they may be priorities for enforcement action. A2.13 Additionally, where a calling party chooses to withhold the CLI on calls we will usually regard its absence as aggravating the harm in any case of misuse. This is particularly so in relation to silent calls, where the call recipient will not have any information about the caller and may consider the call threatening or malicious. A2.14 In other cases of misuse 39 where a CLI number is provided, we may also take into account the following factors: whether the CLI provided 40 was a basic rate number; 41 whether more than one CLI number was used and the circumstances in which they were used; and 37 Such as silent or abandoned calls. 38 For example, whether there are good reasons for making repeat calls. 39 Like silent or abandoned calls. 40 Including in any messages played to or left with the call recipient. 41 A number which costs the same as a standard geographic call, such as 01 or 02, and 03 numbers which are charged at the geographic rate, or a standard mobile rate or a number which is free to the caller, such as 080 numbers. 12

16 when a person makes a return call to the CLI number and hears an information message, whether it contains the sort of information set out in A2.16 A2.17 below. Length of time a call should ring A2.15 Ofcom considers that the length of time a call rings can be an aggravating factor in some cases of misuse. For example, a short period of ringing may not allow sufficient time for a person to answer the phone, and may therefore cause more harm. Conversely, a long period of ringing may increase annoyance and/or anxiety if the person called does not wish to, or is unable to, answer the phone. Ofcom therefore considers that calls that are allowed to ring for less than 15 seconds before being terminated (unless answered before then) by the calling party, or are left ringing for extended periods, are likely to cause more harm and are likely to be subject to enforcement action. Information messages A2.16 Calling parties can often avoid causing silent calls by playing an information message in the event of an abandoned call. Doing so does not mean the call causes no unnecessary harm and does not prevent persistent misuse occurring. An appropriate message can, however, at least reassure the recipient of the caller s identity and that the call is not a malicious silent one. It can also enable the recipient to protect their privacy by calling back and asking not to receive further calls. A2.17 Another factor we may consider, therefore, in assessing the harm in cases involving abandoned calls is the content of the recorded message. It should: identify the party on whose behalf the call was made; 42 explain that the party attempted to contact the recipient; provide details of a basic rate number (see above) which the recipient can call so they decline further calls from the calling party; and not include any marketing content. 43 Time taken to connect the called person to a message A2.18 We also consider the length of time taken to connect the call recipient to a message 44 has the potential to aggravate some forms of misuse. An example would be a delay in the playing of an information message in the event of an abandoned call. A2.19 We may therefore consider in such cases whether the recipient is connected to a message as quickly as possible, and no longer than two seconds, after: 42 Which may but will not necessarily be the same party making the call. 43 In addition, any call made by the abandoned call recipient to the contact number provided in the information message should not be used as an opportunity to market to that person without the person s consent. 44 Whether an information message, an automated message or an interactive message. 13

17 where the message playing is dependent on the technology recognising a voice or sounds to classify the call, the person called begins to speak; 45 or in any other case, the phone has been picked up. Management, practices and processes A2.20 Where effective practices and procedures are in place, adhered to, monitored, and regularly reviewed, they should help to minimise misuse. They should also help to address promptly any which does occur and minimise the risk of it recurring. A2.21 These are matters within a calling party s responsibilities and control. Ofcom may, therefore, take into account in prioritising cases whether a calling party had procedures for example to: test dialling systems when they are set up or changed; ensure their dialling technology is managed by competent persons; set the dialling rate of any ACS at a rate appropriate to the number of call agents employed; and monitor performance of their agents. A2.22 Where a calling organisation engages third parties to act for it, 46 it may also be relevant for Ofcom to consider the arrangements made to select that party and the compliance obligations imposed on it. In particular, whether an organisation took reasonable steps to monitor and assess on-going compliance by the third party, beyond accepting assurances or imposing contractual obligations. Record management A2.23 Ofcom expects that, where organisations are subject to this policy, records that demonstrate that they have acted in accordance with it are kept for at least six months. A2.24 Where organisations are using ACS and/or AMD Ofcom is likely to require relevant information to be made available in the event of an investigation. This will include information about the type of ACS/AMD in use, detailed records of calls 47 and evidence of the accuracy of AMD. A2.25 Where an organisation does not retain or does not provide relevant information, but there are reasonable grounds for believing that there has been persistent misuse, Ofcom is highly likely to take action. We are also likely, in these circumstances, to take into account the lack of records or information when determining the level of any penalty. These points reflect the importance, in protecting call recipients from harm caused by persistent misuse, of appropriate records management. 45 Or start of salutation. 46 For example, to undertake the activity using the network or service on its behalf, or to secure compliance on its behalf. 47 Including total numbers of abandoned calls and live calls for a specified period. 14

18 Annex 3 3 Calculating the Abandoned Call Rate A3.1 As set out in Annex 2, action against abandoned calls is an Ofcom priority and we may take action in any case where a calling organisation makes them. Where it is necessary to prioritise cases one factor we may take into account is the abandoned call rate (or ACR), calculated as set out below. 48 A3.2 The ACR is the proportion of abandoned calls a person makes as a proportion of all calls where a connection was established with a live individual call recipient. 49 A higher ACR would indicate that a greater proportion of a calling party s conduct is misconduct and that Ofcom may be more likely to take action. Definitions and interpretation A3.3 For the purposes of calculating the ACR: an abandoned call is as described in Annex 1 above; a calendar day means between midnight and midnight on a calendar day; a campaign is identified by the making of calls for a single proposition to a single target audience; 50 a live call is where the call is answered by a live individual and the call is connected to a live agent; a silent call is as defined in Annex 1 above; and an unconnected call is a call in which a connection is not established between two parties. How to calculate the ACR The formula A3.4 The ACR formula for each calendar day is: AAAAAAAAAAAAAAAAAA cccccccccc (xx) AAAAAAAAAAAAAAAAAA cccccccccc (xx)+ LLLLLLLL cccccccccc (yy) % 48 On either a per campaign or per call centre basis. Depending on the circumstances of the case, it may be appropriate to assess an organisation s ACR on a disaggregated basis or aggregated basis, or both. For example, where an organisation operates the same campaign simultaneously across more than one call centre, or multiple campaigns simultaneously from one or more call centre, it may be appropriate to calculate the ACR using aggregated data across all call centres and/or all campaigns run by and on behalf of the organisation. It may nonetheless be appropriate in certain cases for Ofcom to consider the ACR on an individual (that is, disaggregated) campaign or call centre basis. This will be determined on a case-by-case basis. 49 Calls where a connection was established are the total of: live calls (i.e. calls which are answered by the person called and connected to a live agent) and abandoned calls (i.e. calls which are answered by the person called and a message, usually an information message, is played). 50 A campaign can be run from more one call centre and/or for more than one calendar day. It may be based on a single call script, though we would not regard slight changes to a call script to constitute a new campaign. We will consider the facts of each case on its own merits. 15

19 A3.5 The following types of calls are excluded from the calculation: silent calls; unconnected calls; calls to answer machines which are: o o o picked up by an answer machine and disconnected by the AMD; picked up by an answer machine, mistaken by the AMD for a live person and connected to a live agent (known in the industry as false negatives ); abandoned to answer machines. A3.6 There may be cases where no data is available as to whether abandoned calls have been made to answer machines or live individuals. To estimate the number abandoned to live individuals, for calculating the ACR in those cases, we need to make an assumption about the number abandoned to answer machines. We will therefore assume that the following ratios are the same: the calls made to answer machines that are connected to live agents compared to total calls passed to live agents; and the calls abandoned to answer machines where no agent is available compared to total calls abandoned where no agent is available. A3.7 This ratio may also be assumed in cases where an organisation uses AMD alongside ACS. Example: Applying the formula for calculating the ACR A3.8 The example below illustrates how to calculate the ACR, on the basis that a call centre makes 1000 calls in a calendar day where: 392 calls are live calls, i.e. answered by a live individual and connected to a live agent (y) 8 calls are abandoned either to a live individual or an answer machine (the number (x) in the ACR formula will be derived from this) 200 calls are unconnected these are excluded from the calculation 400 are connected to a live agent and classified as calls to answer machines (z) these are excluded from the calculation A3.9 The first step is to calculate the number of abandoned calls to answer machines and so those abandoned to live individuals ((x) in the ACR formula). Taking the ratio of calls made to answer machines that are connected to live agents compared to total calls passed to live agents, this can be expressed as z / (y + z), or 400 / ( ) = 50.5 per cent. A3.10 The same ratio is applied to the 8 calls abandoned to live individuals or answer machines, in order to calculate the number abandoned to the former. 16

20 A3.11 Therefore, of the 8 such calls, 50.5% of them are assumed to have been made to answer machines. This produces a reasoned estimate of calls abandoned to answer machines of 8 x 50.5%, or 4.04, meaning that the number of abandoned calls answered by live individuals in this case (x) is estimated to be A3.12 Accordingly, the ACR in this scenario is: (xx) (xx) (yy) % = % 17

DMA advice on persistent misuse

DMA advice on persistent misuse DMA advice on persistent misuse May 2017 0 About this document This document outlines advice to contact centres and brands in the light of Ofcom s statement on persistent misuse. It is the result of consulting

More information

The provision of Calling Line Identification facilities and other related services over Electronic Communications Networks

The provision of Calling Line Identification facilities and other related services over Electronic Communications Networks The provision of Calling Line Identification facilities and other related services over Electronic Communications Networks DRAFT GUIDELINES: Publication Date: 19 September 2017 About this document Calling

More information

Ofcom dialler compliance review

Ofcom dialler compliance review Helping you to verify and maintain compliant dialling campaigns rostrvm Prophet consulting services are based on focused analysis of an organisation s contact and relationship management capability. rostrvm

More information

Guidance on the provision of Calling Line Identification facilities and other related services

Guidance on the provision of Calling Line Identification facilities and other related services Guidance on the provision of Calling Line Identification facilities and other related services GUIDANCE ON CLI FACILITIES Publication Date: 30 July 2018 About this document Calling Line Identification

More information

Our Data Protection Officer is Andrew Garrett, Operations Manager

Our Data Protection Officer is Andrew Garrett, Operations Manager Construction Youth Trust Privacy Notice We are committed to protecting your personal information Construction Youth Trust is committed to respecting and keeping safe any personal information you share

More information

Code of Practice for Premium Rate Services.

Code of Practice for Premium Rate Services. 1 Code of Practice for Premium Rate Services. This code explains what Premium Rate Services are, how they work, how much they cost, and how to stop them if you no longer want them. If you d like a free

More information

"PPS" is Private Practice Software as developed and produced by Rushcliff Ltd.

PPS is Private Practice Software as developed and produced by Rushcliff Ltd. Rushcliff Ltd Data Processing Agreement This Data Processing Agreement ( DPA ) forms part of the main terms of use of PPS, PPS Express, PPS Online booking, any other Rushcliff products or services and

More information

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

HF Markets SA (Pty) Ltd Protection of Personal Information Policy Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and

More information

NDIS Quality and Safeguards Commission. Incident Management System Guidance

NDIS Quality and Safeguards Commission. Incident Management System Guidance NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the

More information

REPORT OF THE ADJUDICATOR

REPORT OF THE ADJUDICATOR REPORT OF THE ADJUDICATOR Complaint reference number: 12547 WASPA member(s): Nashua Mobile Membership number(s): 0013 Complainant: Type of complaint: Competitor Spam Date complaint was lodged: 4 April

More information

Response of Microsoft Corporation to Ofcom s consultation document. Guidelines for CLI Facilities. 14 November 2017

Response of Microsoft Corporation to Ofcom s consultation document. Guidelines for CLI Facilities. 14 November 2017 Response of Microsoft Corporation to Ofcom s consultation document Guidelines for CLI Facilities 14 November 2017 14 November 2017 Microsoft s response to Ofcom s consultation on changes to the CLI guidelines

More information

COMMUNICATIONS ALLIANCE LTD INDUSTRY GUIDANCE NOTE IGN 010 CUSTOMER PROCESS HANDLING OF LIFE THREATENING AND UNWELCOME COMMUNICATIONS

COMMUNICATIONS ALLIANCE LTD INDUSTRY GUIDANCE NOTE IGN 010 CUSTOMER PROCESS HANDLING OF LIFE THREATENING AND UNWELCOME COMMUNICATIONS COMMUNICATIONS ALLIANCE LTD INDUSTRY GUIDANCE NOTE IGN 010 CUSTOMER PROCESS HANDLING OF LIFE THREATENING AND UNWELCOME COMMUNICATIONS Customer Process Handling of Life Threatening and Unwelcome Communications

More information

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2

NWQ Capital Management Pty Ltd. Privacy Policy. March 2017 v2 NWQ Capital Management Pty Ltd Privacy Policy March 2017 Page 1 of 8 Privacy and Spam Policy NWQ Capital Management Pty Ltd s Commitment NWQ Capital Management Pty Ltd (NWQ) is committed to providing you

More information

SECTION 2-13: CARRIER PRESELECTION ACCESS SERVICE

SECTION 2-13: CARRIER PRESELECTION ACCESS SERVICE SECTION 2-13: CARRIER PRESELECTION ACCESS SERVICE 1 THE SERVICE The Carrier PreSelection Access Service is an inter-operator service which supports the circumstances such that an End User s National Services

More information

CHAPTER 13 ELECTRONIC COMMERCE

CHAPTER 13 ELECTRONIC COMMERCE CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial

More information

THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003

THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, December 29, 2003 THE CAN-SPAM ACT OF 2003: FREQUENTLY ASKED QUESTIONS EFFECTIVE JANUARY 1, 2004 This FAQ is not intended to provide specific advice about individual legal, business, or other questions. It was prepared

More information

This policy should be read in conjunction with LEAP s Conflict of Interest Policy.

This policy should be read in conjunction with LEAP s Conflict of Interest Policy. Policy Number 4.1 Policy Name Release No. 2 Release Date August 2017 Date For Next Review August 2018 Policy LEAP Social Services/Different Abilities Services (LEAP) is committed to the effective, timely

More information

Little Blue Studio. Data Protection and Security Policy. Updated May 2018

Little Blue Studio. Data Protection and Security Policy. Updated May 2018 Little Blue Studio Data Protection and Security Policy Updated May 2018 Contents Introduction... 3 Purpose... 3 Application... 3 General Data Protection Regulation (GDPR)... 3 Handling personal information,

More information

THE CODE COMPLIANCE PANEL OF PHONEPAYPLUS TRIBUNAL DECISION

THE CODE COMPLIANCE PANEL OF PHONEPAYPLUS TRIBUNAL DECISION THE CODE COMPLIANCE PANEL OF PHONEPAYPLUS Thursday, 3 September 2009 TRIBUNAL SITTING No. 35 / CASE 1 CASE REFERENCE: 775639/JI TRIBUNAL DECISION Service provider: MX Telecom Limited, London Information

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Preamble This document may be augmented or replaced by relevant sections of other parts of our Agreement, and should be read in conjunction with other supporting documents, so please

More information

BRITISH LIBRARY COMPLAINTS POLICY

BRITISH LIBRARY COMPLAINTS POLICY BRITISH LIBRARY COMPLAINTS POLICY INTRODUCTION 1. The British Library is committed to providing excellent service, and we invite feedback - to ensure the continuous improvement of the services and facilities

More information

Foxtel Home Phone Service Description

Foxtel Home Phone Service Description Foxtel Broadband & Home Phone Agreement Foxtel Home Phone Service Description Effective from 23 February, 2016 CONTENTS 1. ABOUT THIS SERVICE DESCRIPTION 1 2. FOXTEL HOME PHONE 1 3. PLANS 1 4. MINIMUM

More information

Canada's New Anti-spam Law Are you prepared? Tricia Kuhl (Blakes) Dara Lambie (Blakes) Presented to ACC Ontario Chapter May 9, 2012

Canada's New Anti-spam Law Are you prepared? Tricia Kuhl (Blakes) Dara Lambie (Blakes) Presented to ACC Ontario Chapter May 9, 2012 Canada's New Anti-spam Law Are you prepared? Tricia Kuhl (Blakes) Dara Lambie (Blakes) Presented to ACC Ontario Chapter May 9, 2012 OVERVIEW Background & Status Breadth & Scope Penalties & Liability Compliance

More information

PS Mailing Services Ltd Data Protection Policy May 2018

PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Ltd Data Protection Policy May 2018 PS Mailing Services Limited is a registered data controller: ICO registration no. Z9106387 (www.ico.org.uk 1. Introduction 1.1. Background We collect

More information

Part B of this Policy sets out the rights that all individuals have in relation to the collection and use of your personal information

Part B of this Policy sets out the rights that all individuals have in relation to the collection and use of your personal information Date: 15 Feb 2018 Issue No: 1 Page: 1 of 15 Site: UK Kingspan Insulation Limited ("Kingspan") has issued this Data Protection Policy for its customers. The term customer refers to those that receive a

More information

Internode Complaint Handling Policy

Internode Complaint Handling Policy Internode Complaint Handling Policy This article will outline our Complaint Handling Policy. While we always aim to provide you with awesome customer service, if you haven t received the service you expected,

More information

Terms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber

Terms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber Terms and Conditions of Mobile Phone Service (Post-Paid) Between Operator and Subscriber Section 1 General 1.1 This Terms and Conditions of Mobile Phone Service shall be effective between Advanced Wireless

More information

Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework

Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework JULY 2013 Business Council of Australia July 2013 1 About

More information

MODEL COMPLAINTS SYSTEM AND POLICY THE OMBUDSMAN'S GUIDE TO DEVELOPING A COMPLAINT HANDLING SYSTEM

MODEL COMPLAINTS SYSTEM AND POLICY THE OMBUDSMAN'S GUIDE TO DEVELOPING A COMPLAINT HANDLING SYSTEM MODEL COMPLAINTS SYSTEM AND POLICY THE OMBUDSMAN'S GUIDE TO DEVELOPING A COMPLAINT HANDLING SYSTEM Published by the Office of the Ombudsman 18 Lower Leeson Street Dublin 2 Telephone: 01 639 5600 Lo-call:

More information

Acceptable Use Policy. Effective January 2017

Acceptable Use Policy. Effective January 2017 Acceptable Use Policy Effective January 2017 THIS ACCEPTABLE USE POLICY IS A MATERIAL PART OF ANY AGREEMENT WITH STRAIGHTUPNET COMMUNICATIONS FOR PROVISION OF ITS SERVICES TO BUSINESS AND CONSUMER CUSTOMERS.

More information

Vodafone Business Phone User Guide

Vodafone Business Phone User Guide Vodafone Business Phone User Guide Contents 1. VODAFONE CALLING FEATURES 4 1.1 Inclusive Calling Features 4 Find out who s called you 4 Hiding your phone number 4 1.2 Optional Calling Features 5 Call Divert

More information

2. What is Personal Information and Non-Personally Identifiable Information?

2. What is Personal Information and Non-Personally Identifiable Information? Privacy Notice Snipp Interactive, Inc. Last Updated: February 11, 2016 Contents: 1. Introduction 2. What is Personal Information? 3. Information we collect about you 4. Use of Your Information 5. Location

More information

Group means any company within the STB Leasing Limited s group of companies and/or the ThinkSmart group of companies.

Group means any company within the STB Leasing Limited s group of companies and/or the ThinkSmart group of companies. PRIVACY DECLARATION In this Privacy Declaration, unless the context otherwise requires: We, us, our means STB Leasing Limited, and/or RentSmart Limited trading as ThinkSmart ( ThinkSmart / we / us ), and

More information

These terms are product specific terms which apply to our DSL Services.

These terms are product specific terms which apply to our DSL Services. CONDITIONS OF SERVICE - DSL SERVICES 1. ABOUT These terms are product specific terms which apply to our DSL Services. 2. APPLICATION We will supply the DSL Services to you pursuant to the terms and conditions

More information

THE CODE COMPLIANCE PANEL OF PHONEPAYPLUS TRIBUNAL DECISION

THE CODE COMPLIANCE PANEL OF PHONEPAYPLUS TRIBUNAL DECISION THE CODE COMPLIANCE PANEL OF PHONEPAYPLUS TRIBUNAL DECISION Thursday 18 December 2008 TRIBUNAL SITTING No. 17 / CASE 4 CASE REFERENCE: 758834/AB Service provider & area: Dialogue Communications Limited,

More information

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018 ma recycle.com Rely and Comply... GDPR Privacy Policy Policy Date: 24 May 2018 Max Recycle Hawthorne House Blackthorn Way Sedgeletch Industrial Estate Fencehouses Tyne & Wear DH4 6JN T: 0845 026 0026 F:

More information

Islam21c.com Data Protection and Privacy Policy

Islam21c.com Data Protection and Privacy Policy Islam21c.com Data Protection and Privacy Policy Purpose of this policy The purpose of this policy is to communicate to staff, volunteers, donors, non-donors, supporters and clients of Islam21c the approach

More information

Terms and Conditions of use for the

Terms and Conditions of use for the Terms and Conditions of use for the Site Builder 1 Introduction The Site Builder is a computer system operated over the Internet to support the creation and management of websites for individual U3A, including

More information

Privacy notice. Last updated: 25 May 2018

Privacy notice. Last updated: 25 May 2018 Privacy notice Last updated: 25 May 2018 www.courtprice.co.uk ('Website') is provided by Courtprice Limited ('we'/'us'/'our'). In doing so, we may be in a position to receive and process personal information

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

Privacy Policy May 2018

Privacy Policy May 2018 Privacy Policy May 2018 Laser Surveys Ltd T/A Open Space Rooms Laser Surveys operates a privacy first approach to all our business activities and will only require the minimum information to perform our

More information

DATA PROTECTION POLICY THE HOLST GROUP

DATA PROTECTION POLICY THE HOLST GROUP DATA PROTECTION POLICY THE HOLST GROUP INTRODUCTION The purpose of this document is to provide a concise policy regarding the data protection obligations of The Holst Group. The Holst Group is a data controller

More information

NUCONNECT INTERNET ACCEPTABLE USE POLICY

NUCONNECT INTERNET ACCEPTABLE USE POLICY NUCONNECT INTERNET ACCEPTABLE USE POLICY This Acceptable Use Policy ( AUP ) applies to NUconnect Internet and related services ("Services ) delivered by Newport Utilities. This policy is designed to encourage

More information

H. R To reduce unsolicited commercial electronic mail and to protect children from sexually oriented advertisements.

H. R To reduce unsolicited commercial electronic mail and to protect children from sexually oriented advertisements. I 0TH CONGRESS ST SESSION H. R. To reduce unsolicited commercial electronic mail and to protect children from sexually oriented advertisements. IN THE HOUSE OF REPRESENTATIVES MAY, 00 Ms. LOFGREN (for

More information

Introduction to the Personal Data (Privacy) Ordinance

Introduction to the Personal Data (Privacy) Ordinance Introduction to the Personal Data (Privacy) Ordinance Personal Data (Privacy) Ordinance Legislative Background Personal Data (Privacy) Ordinance came into effect on 20 December 1996 Amendment of the Ordinance

More information

DS MEDIA & EVENTS LTD PRIVACY POLICY

DS MEDIA & EVENTS LTD PRIVACY POLICY DS MEDIA & EVENTS LTD PRIVACY POLICY ABOUT US DS Media & Events Ltd and its affiliated events, collectively Events of the North ( DS Media & Events, Events of the North us, we, our ) is a company registered

More information

IBM Managed Security Services for Security

IBM Managed Security Services for  Security Service Description 1. Scope of Services IBM Managed Security Services for E-mail Security IBM Managed Security Services for E-mail Security (called MSS for E-mail Security ) may include: a. E-mail Antivirus

More information

As set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above.

As set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above. As set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above. B (1)B (2) * In the case of a non-hong Kong ID cardholder, state the passport number or any identification

More information

Promise Dreams Privacy Policy

Promise Dreams Privacy Policy Promise Dreams Privacy Policy Introduction Promise Dreams ( we ) promises to respect any personal data you share with us and keep it safe. We aim to be clear when we collect your data and not do anything

More information

SMS SERVICE PROVISION

SMS SERVICE PROVISION SMS SERVICE PROVISION Terms and Conditions and Privacy Policy Version 2.05 Jan 2017 Page 1 Contents TERMS & CONDITIONS... 3 Registration... 3 Your Personal Information... 3 Our Obligations to SMS Service

More information

SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE

SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE SERVICE SCHEDULE & ADDITIONAL TERMS AND CONDITIONS FOR DIRECT WHOLESALE INTERCONNECT VOICE SERVICE The following terms and conditions are additional to those in the prevailing Viatel General Terms and

More information

IDENTITY ASSURANCE PRINCIPLES

IDENTITY ASSURANCE PRINCIPLES IDENTITY ASSURANCE PRINCIPLES PRIVACY AND CONSUMER ADVISORY GROUP (PCAG) V3.1 17 th July 2014 CONTENTS 1. Introduction 3 2. The Context of the Principles 4 3. Definitions 6 4. The Nine Identity Assurance

More information

Terms and Conditions of Mobile Phone Service (Pre-Paid) Between Operator and Subscriber

Terms and Conditions of Mobile Phone Service (Pre-Paid) Between Operator and Subscriber Terms and Conditions of Mobile Phone Service (Pre-Paid) Between Operator and Subscriber Section 1 General 1.1 This Terms and Conditions of Mobile Phone Service shall be effective between Advanced Wireless

More information

Policy & Procedure Privacy Policy

Policy & Procedure Privacy Policy NUMBER POL 050 PAGES 12 VERSION V3.8 CREATED: LAST MODIFIED: REVISION: 05/11/2009 06/06/2018 06/06/2019 DOCUMENTS: Authority to Exchange Information Media Authority Student Staff Privacy Agreement REFERENCES:

More information

INNOVENT LEASING LIMITED. Privacy Notice

INNOVENT LEASING LIMITED. Privacy Notice INNOVENT LEASING LIMITED Privacy Notice Table of Contents Topic Page number KEY SUMMARY 2 ABOUT US AND THIS NOTICE 3 USEFUL WORDS AND PHRASES 4 WHAT INFORMATION DO WE COLLECT? 4 WHY DO WE PROCESS YOUR

More information

The information we collect

The information we collect Phone: (02) 8035 8000 Web: www.carnextdoor.com.au Email: info@carnextdoor.com.au Address: Level 3, 55 Pyrmont Bridge Rd, Pyrmont, NSW, 2009 CAR NEXT DOOR PRIVACY POLICY AND CREDIT REPORTING POLICY Last

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Jackson Energy Authority 731.422.7500 INTRODUCTION Jackson Energy Authority ( JEA ) has formulated this Acceptable Use Policy ( AUP ), in order to set forth terms regarding the responsible

More information

Complaints Guidance. 1. We have adopted the Legal Ombudsman s definition of a complaint. Please see this Handbook s Glossary.

Complaints Guidance. 1. We have adopted the Legal Ombudsman s definition of a complaint. Please see this Handbook s Glossary. Complaints Guidance Complaints Guidance 1. We have adopted the s definition of a complaint. Please see this Handbook s Glossary. 2. Contact information for : Tel no: 0300 555 0333 Email:enquiries@legalombudsman.org.uk

More information

You may contact The Translation Network by at You may also call The Translation Network at

You may contact The Translation Network by  at You may also call The Translation Network at The Translation Network Privacy Policy This is a privacy policy for The Translation Network Group Inc. The Translation Network has created this privacy statement in order to demonstrate its firm commitment

More information

Acceptable Use Policy

Acceptable Use Policy 1 INTRODUCTION and its subsidiaries ( us, we or our ) have produced this acceptable use policy in order to: Give you a better understanding of what is and is not acceptable when using the internet Encourage

More information

Terms and Conditions for External accounts Service

Terms and Conditions for External accounts Service Terms and Conditions for External accounts Service You must read these Terms and Conditions before using External accounts service. IMPORTANT INFORMATION External accounts service is an account aggregation

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

Dentons Canada LLP. Understanding CASL. Presented to the Alberta Chambers of. Craig T. McDougall and Thomas A. Sides

Dentons Canada LLP. Understanding CASL. Presented to the Alberta Chambers of. Craig T. McDougall and Thomas A. Sides Dentons Canada LLP Understanding CASL Presented to the Alberta Chambers of Commerce April 22, 2014 Craig T. McDougall and Thomas A. Sides Understanding CASL 1) Background and Key Dates 2) Commercial Electronic

More information

It s still very important that you take some steps to help keep up security when you re online:

It s still very important that you take some steps to help keep up security when you re online: PRIVACY & SECURITY The protection and privacy of your personal information is a priority to us. Privacy & Security The protection and privacy of your personal information is a priority to us. This means

More information

Malpractice and Maladministration Policy

Malpractice and Maladministration Policy Malpractice and Maladministration Policy Introduction This policy is aimed at our customers, including learners, who are delivering/registered on BCS approved qualifications or units within or outside

More information

Vodafone Location Services. Privacy Management Code of Practice. Issued Version V1.0

Vodafone Location Services. Privacy Management Code of Practice. Issued Version V1.0 Vodafone Location Services Privacy Management Code of Practice Issued Version V1.0 Issued Version 1.0 Page 1 of10 17/08/03 August 2003 Vodafone Limited. All rights reserved. CONTENTS 0. Overview.. 3 1.

More information

PTLGateway Acceptable Use Policy

PTLGateway Acceptable Use Policy 1 PTLGateway Acceptable Use Policy Last Updated Date: 02 March 2018 Acceptable Use Policy Your use of our Services must fall within our Acceptable Usage Policy. Contents Key details... 1 COVERAGE OF THIS

More information

Canadian Anti Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS

Canadian Anti Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS Canadian Anti Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS Note: This FAQ is intended to assist OC staff and faculty members to understand their obligations under the CASL. It summarizes and simplifies

More information

Privacy Policy. Information about us. What personal data do we collect and how do we use it?

Privacy Policy. Information about us. What personal data do we collect and how do we use it? This privacy policy sets out the way in which your personal data is handled by Leeds Bradford Airport Limited (referred to as "we", "us" and "our") whether collected through one of the websites we operate,

More information

Section 7 - Custom Calling Services

Section 7 - Custom Calling Services A. TERMS AND CONDITIONS Custom Calling Services are offered only from select central offices where the Company has arranged the facilities for these services and are furnished subject to the availability

More information

This information accompanies the online data sharing best practice guidance commissioned by ACE

This information accompanies the online data sharing best practice guidance commissioned by ACE Data Protection - What the regulations say This information accompanies the online data sharing best practice guidance commissioned by ACE The guidance cannot be relied upon as legal advice. This document

More information

CINCINNATI BELL TELEPHONE COMPANY LLC Residence Service Agreement - Local Telephone Services Nonresidence Service Agreement - Local Telephone Services

CINCINNATI BELL TELEPHONE COMPANY LLC Residence Service Agreement - Local Telephone Services Nonresidence Service Agreement - Local Telephone Services A. TERMS AND CONDITIONS Custom Calling Services are offered only from select central offices where the Company has arranged the facilities for these services and are furnished subject to the availability

More information

NSDA ANTI-SPAM POLICY

NSDA ANTI-SPAM POLICY NSDA ANTI-SPAM POLICY Overview On July 1, 2014, Canada s Anti-spam Legislation (CASL) took effect. Coupled with existing regulations, the new legislation sets specific restrictions on using electronic

More information

PROPOSALS FOR THE REGULATION OF VIDEO ON DEMAND SERVICES RESPONSE BY BRITISH SKY BROADCASTING LIMITED

PROPOSALS FOR THE REGULATION OF VIDEO ON DEMAND SERVICES RESPONSE BY BRITISH SKY BROADCASTING LIMITED PROPOSALS FOR THE REGULATION OF VIDEO ON DEMAND SERVICES RESPONSE BY BRITISH SKY BROADCASTING LIMITED 1. INTRODUCTION 1.1. On 14 September 2009, Ofcom published its consultation document entitled Proposals

More information

PRIVACY POLICY. 1. What Information We Collect

PRIVACY POLICY. 1. What Information We Collect PRIVACY POLICY This website, located at http://www.santana.com (the "Site"), is owned and operated by Cadestansa LLC dba Santana Management. Your privacy is important to Santana. This Privacy Policy (the

More information

What kind of information do you collect, when and how?

What kind of information do you collect, when and how? Associated Telecom Solutions Privacy Policy Action- Tec Services Ltd T/A Associated Telecom Solutions collects business data in order to provide our services to our business customers. During the relationship

More information

Blue Alligator Company Privacy Notice (Last updated 21 May 2018)

Blue Alligator Company Privacy Notice (Last updated 21 May 2018) Blue Alligator Company Privacy Notice (Last updated 21 May 2018) Who are we? Blue Alligator Company Limited (hereafter referred to as BAC ) is a company incorporated in England with company registration

More information

MBNL Landlord Privacy Notice. This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR).

MBNL Landlord Privacy Notice. This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR). MBNL Landlord Privacy Notice This notice sets out how we handle landlord personal data as part of our General Data Protection policies (GDPR). SUMMARY This Privacy Notice applies to: users of our website

More information

Privacy and Data Protection Policy

Privacy and Data Protection Policy Privacy and Data Protection Policy Introduction 1. The Ripple Pond is committed to ensuring the secure and safe management of personal data held by the Charity in relation to Beneficiaries, Staff, Trustees,

More information

Learning Management System - Privacy Policy

Learning Management System - Privacy Policy We recognize that visitors to our Learning Management System (LMS) may be concerned about what happens to information they provide when they make use of the system. We also recognize that education and

More information

AusBBS Complaints Handling Policy

AusBBS Complaints Handling Policy AusBBS Complaints Handling Policy Valid as of 11 September 2018 Australian Broadband Services Pty Limited ABN 97 150 723 354 ( AusBBS ) AusBBS Complaints Handling Policy Table of Contents 1. Introduction

More information

NebraskaLink Acceptable Use Policy

NebraskaLink Acceptable Use Policy NebraskaLink Acceptable Use Policy Introduction This acceptable use policy (the "Policy") defines acceptable practices relating to the use of NebraskaLink's services (the "Service") by customers of NebraskaLink

More information

Contributed by Djingov, Gouginski, Kyutchukov & Velichkov

Contributed by Djingov, Gouginski, Kyutchukov & Velichkov Contributed by Djingov, Gouginski, Kyutchukov & Velichkov General I Data Protection Laws National Legislation General data protection laws The Personal Data Protection Act implemented the Data Protection

More information

Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS

Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS IMPORTANT: This FAQ is intended to assist UofL staff and faculty members to understand their obligations under CASL. It is an overview of

More information

Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask

Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask Canada s Anti-Spam Law ( CASL ): It s the Law on July 1, 2014 questions for directors to ask Author: Jennifer Babe, LL.M, ICD.D Why Should I Read This Alert? a) despite its name, this Act covers much more

More information

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017 This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,

More information

Privacy and Cookies Policy

Privacy and Cookies Policy Sohn Foundation London Privacy and Cookies Policy The Sohn Foundation London (company number: 08075575, charity number: 1148454) is a wholly owned subsidiary of The Ira Sohn Conference Foundation, Inc.

More information

Last updated: 25 May 2018

Last updated: 25 May 2018 Privacy Policy Last updated: 25 May 2018 1. Introduction 1.1 St Saviour s Church ( we, our, us ) is committed to protecting and respecting your privacy. St Saviour s Church is a registered charity, and

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy This Acceptable Use Policy is in addition to South Central Communication s Terms of Service and together the documents constitute the Agreement between South Central Communications

More information

Important Information

Important Information Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland

More information

Code of Practice. Mobile Spam. 1.0 February Official Document PPC.01. Security Classification Category (see next page)

Code of Practice. Mobile Spam. 1.0 February Official Document PPC.01. Security Classification Category (see next page) Code of Practice Mobile Spam 1.0 February 2006 This is a non-binding permanent reference document of the GSM Association. Security Classification Category (see next page) This is an document. 1.0 Page

More information

SeelogicMail Terms and Conditions

SeelogicMail Terms and Conditions SeelogicMail Terms and Conditions Seelogic Mail (the "Services"), is a web based software application that offers businesses and web site operators a software application for HTML design, email list management

More information

REVISION HISTORY DATE AMENDMENT DESCRIPTION OF AMENDMENT

REVISION HISTORY DATE AMENDMENT DESCRIPTION OF AMENDMENT REVISION HISTORY DATE AMENDMENT DESCRIPTION OF AMENDMENT SERVICE DESCRIPTION Page 1 of 17 SERVICE DESCRIPTION 2-11: WHOLESALE DSL SERVICE 1. THE SERVICE The Wholesale DSL service is a service which enables

More information

Outgoing Ltd Official Ticketing Agent Terms and Conditions

Outgoing Ltd Official Ticketing Agent Terms and Conditions Outgoing Ltd Official Ticketing Agent Terms and Conditions In these terms and conditions "Outgoing" refers to Outgoing Ltd. Outgoing sells all tickets as an agent on behalf of the organisers and Outgoing

More information

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers Data Protection Code of Conduct for Cloud Infrastructure Service Providers 27 JANUARY 2017 Introduction... 3 1 Structure of the Code... 5 2 Purpose... 6 3 Scope... 7 4 Data Protection Requirements... 9

More information

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System

DATA PRIVACY & PROTECTION POLICY POLICY INFORMATION WE COLLECT AND RECEIVE. Quality Management System DATA PRIVACY & PROTECTION POLICY POLICY This Data Privacy & Protection Policy applies to ELMO Software Limited s Cloud HR & Payroll applications and platform (collectively, the Services ), elmosoftware.com.au

More information

Complaints and Compliments Policy. Date Approved: 28 September Approved By: Governing Body. Ownership: Corporate Development

Complaints and Compliments Policy. Date Approved: 28 September Approved By: Governing Body. Ownership: Corporate Development Complaints and Compliments Policy Date Approved: 28 September 2016 Approved By: Ownership: Governing Body Corporate Development Date of Issue: August 2017 Proposed Date of Review: August 2019 Date of Equality

More information

RIGHTMOVE PRODUCT GUIDELINES New Homes. Core Membership means the basic Services to which You are entitled in return for your Core Membership Fee.

RIGHTMOVE PRODUCT GUIDELINES New Homes. Core Membership means the basic Services to which You are entitled in return for your Core Membership Fee. RIGHTMOVE PRODUCT GUIDELINES New Homes DEFINITIONS Core Membership means the basic Services to which You are entitled in return for your Core Membership Fee. Additional Products means the additional Services

More information

One Sector Community Limited ACN ( OSC ) Privacy Policy

One Sector Community Limited ACN ( OSC ) Privacy Policy One Sector Community Limited ACN 623 427 323 ( OSC ) Privacy Policy General Collection OSC and its related entities (referred to in this document as we, us or our ) are committed to protecting the personal

More information

ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B)

ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) ADDITIONAL TERMS FOR HOSTED IP TELEPHONY SERVICES SCHEDULE 2K(B) CONTENTS 1. Service Description... 3 2. Definitions... 3 3. Service Terms... 3 4. IP Phones... 4 5. Customer Obligations... 4 6. Access

More information